INFORMATION TECHNOLOGY PAPER 2
GRADE 12
NOVEMBER 2020
MEMORANDUM
NATIONAL SENIOR CERTIFICATE
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1
1.1.1 A ✓(1)
1.1.2 C✓ (1)
1.1.3 D ✓ (1)
1.1.4 C ✓ (1)
1.1.5 D ✓ (1)
1.2
1.2.1 E ✓
RAID (1)
1.2.2 R / C ✓
Alternate key/ Foreign key (1)
1.2.3 P ✓
Biometrics (1)
1.2.4 L ✓
SSL (1)
1.2.5 A ✓
Digital divide (1)
1.2.6 O ✓
Disk defragmentation (1)
1.2.7 Q ✓
Drivers (1)
1.2.8 M ✓
FTP (1)
1.2.9 J ✓
Rollback (1)
1.2.10 H ✓
Utility software (1)
TOTAL SECTION A: 15
SECTION B: SYSTEM TECHNOLOGIES
QUESTION 2
2.1
2.1.1 Any ONE: ✓
2.1.2 Any ONE: ✓
More expensive when compared to hard drives The inability to recover old data(1)
2.2
2.2.1 RAM loses its contents when power is lost ✓/computer is switched off
Or any other correct explanation (1)
2.2.2 Any ONE: ✓
If the operating system/machine is 64-bit it can use more than 4 GB of RAM.
OR
If the operating system/machine is 32 bit, it would not be able to use more than 4 GB of RAM. (1)
2.2.3
2.3
2.3.1 Any ONE:
Virtualisation/ Emulator/or examples of virtualisation software (1)
2.3.2 Any TWO of the following concepts: ✓✓
2.4
2.4.1 A language that is easy for humans to write and understand/ language closely related to the language we use✓, because it relates to the English language. (1)
2.4.2
Interpreter | Compiler |
An interpreter displays error message(s) line by line | The compiler provides a list of error messages |
Does not provide an executionable file | Provides an executionable file |
2.4.3 An API is an interface between the programming language✓ and operating system/ software/ services/ hardware✓ (2)
2.5
2.5.1 DIMM slots✓ (1)
2.5.2 SATA connectors/ USB/ Firewire/ Thunderbolt ✓ (1)
2.5.3 Any ONE: ✓
PCI-Express slot OR PCI-e OR AGP OR USB (1)
2.6 The system clock generates pulses✓ that regulates the rate at which data is transferred between components.✓
Concepts
Pulses are generated (1 mark)
The rate at which data is transferred (1 mark) (2)
2.7
2.7.1 Machine cycle ✓ (1)
2.7.2 Point-to-point connection ✓ (1)
TOTAL SECTION B: 25
SECTION C: COMMUNICATIONS AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1
3.1.2 Any TWO: ✓✓
Low/No signal degradation over a distance/ (Lower attenuation)
Mostly not affected by electro-magnetic interferences (EMI).
Immune to eavesdropping/more secure
Immune to crosstalk (2)
3.1.3 Any TWO: ✓✓
UTP is less prone to Interference
UTP is not as slow when shared between multiple users
UTP is not as influenced by objects like walls and trees
UTP has better security
Alternative:
Answers can be provided from the perspective of Wifi. (2)
3.1.4 A cable that connects different network segments or LANs together.✓
OR
A backbone is part of a computer network that interconnects various pieces of a network providing a path of information exchange. (1)
3.1.5 Any ONE: ✓
A NIC facilitates/provides communication/connection between a computer and a network medium.
OR
Functions to encode and decode messages between computer and network (1)
3.2 Any ONE: ✓
The ability to choose what the user wants to watch
A service which allows users to watch video content on demand (per request – users do not need to watch scheduled content) OR
Any other suitable description.(1)
3.3
3.3.1 Any ONE: ✓
3.3.2 No downloading of copyrighted material✓ (1)
3.4 Blogs can be published by anyone. ✓
Information is not verified. ✓ (2)
3.5 A static webpage displays the exact same information every time it is viewed✓ while the information displayed by a dynamic webpage may differ✓ based on the user/ time/environment/ more interactive. (2)
3.6 Any ONE: ✓
3.7
3.7.1 Web browser ✓
Also accept a correct example such as Internet explorer/Mozilla Firefox (1)
3.7.2 Any TWO: ✓✓
Concepts:
Centralised design in a single file/only once
All web pages can access the design from the CSS files (2)
3.7.3 Combines JavaScript with a browser command to allow the browser to download data✓ without refreshing the entire webpage.✓
OR
Allows parts of a webpage to be updated (1 mark) without updating the entire webpage. (1 mark) (2)
3.8
3.8.1 A group of computers✓ controlled by a hacker/computer criminal/ malicious software ✓and that work together to be used in an illegal manner (2)
3.8.2 Using a large number of computers✓ to overload servers/service with a large number of requests ✓ making it inaccessible. ✓ (3)
3.8.3 computer used/controlled by a computer criminal/ malware✓ in a DDoS attack or other criminal activity. (1)
3.9
3.9.1 A type of malware that records keystrokes✓ and sends it off to a third party. (1)
3.9.2 Any TWO:✓✓
TOTAL SECTION C: 30
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1
4.1.1 Data in field of primary key must be unique (no duplicates). ✓
Cannot be null/empty.✓ (2)
4.1.2
4.1.3 Entity Relationship Diagram ✓
Also accept ER diagram / ERD/ Relationship diagram (1)
4.2 Any ONE✓
Boolean
Yes/No
True/False (1)
4.3 The number of days it takes to process the request can be calculated/derived.✓ (1)
4.4
4.4.1 Any ONE:✓
4.4.2 Any ONE: ✓
4.5
4.5.1 TWO Marks:
Test for correct range (0 or 1)
OR
ONE Mark each:
Ensure/test for acceptable data
Test for correct data type (Number) (2)
4.5.2 Data verification:
Checking the correctness ✓ of data against the source/ human perspective. (1)
4.6 Any TWO: ✓✓
4.7
4.7.1 Data independence refers to the separation between software ✓that uses the database application and the actual data structure✓ managed by the DBMS server. (2)
4.7.2 Logical independence✓ (1)
4.7.3 Any TWO✓✓
TOTAL SECTION D: 20
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1
5.1.1 A syntax error occurs when the rules of the programming language (or an example of a programming language error) are violated✓ OR
an error that prevents the program from running.
A runtime error occurs when the program is executed/run and a problem is encountered (or an example of a runtime error). ✓ (2)
5.1.2 Any TWO sensible guidelines:✓✓
5.2 The array list needs to be sorted ✓before binary search can be done. (1)
5.3
5.3.1 Any ONE✓
5.3.2 Any TWO✓✓
5.4
Block Nr | f1 | f2 | i | i < 3? | fn | Output |
1 | 2 | |||||
2 | 3 | |||||
3 | 1 | |||||
4 | Yes | |||||
5 | 5 | |||||
6 | 3 | |||||
7 | 5 | |||||
8 | 2 | |||||
4 | Yes | |||||
5 | 8 | |||||
6 | 5 | |||||
7 | 8 | |||||
8 | 3 | |||||
4 | No | |||||
9 | 8 |
12/2=(6)
5.5 Inc(i) OR Inc(i,1) (1)
5.6
5.6.1 + indicates public ✓members/methods/attributes
- indicates private ✓members/ methods/attributes
Also accept Public and Private if provided in that order without symbols. (2)
5.6.2 Any TWO: ✓✓
Note:
Also accept the name of the incorrect method without an explanation. (2)
5.6.3 toString ✓ (1)
TOTAL SECTION E: 20
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1
6.1.1 Any TWO:✓✓
Cache memory is physically closer to/on the CPU.
Cache memory stores frequently/recently/likely to be used instructions.
Type of memory used for cache memory is faster than RAM.
Do not accept only faster (2)
6.1.2 Any TWO: ✓✓
The CPU speed in GHz - higher speed improves performance
Number of cores - more for better performance
Number of threads - more for better performance (2)
6.1.3
6.2 Any TWO: ✓✓
6.3
6.3.1 Any TWO: ✓✓
6.3.2 The distribution/sharing of resources of powerful computers between users ✓
The combining of resources of different computers to create a super powerful service ✓ (2)
6.4
6.4.1 Any TWO: ✓✓
6.4.2
6.4.3 Any TWO: ✓✓
6.5 Any TWO: ✓✓
6.6
6.6.1 Any TWO ✓✓
6.6.2 Any ONE: ✓
6.6.3 Sharing a cellular internet connection ✓ to connect devices via Wi-Fi/Radio✓ (2)
6.6.4
6.6.5 Allows communication/sharing between electronic devices at a short distance from each other.✓
OR a correct and suitable description. (1)
6.7 Any TWO: ✓✓
6.8 Any TWO: ✓✓
6.9
6.9.1 Any ONE✓
Radio/Radio waves
Electromagnetism/Electromagnetic waves (1)
6.9.2 Any TWO✓✓
In terms of security related issues (scenario in question):
RFID cannot be easily copied as in the case of barcodes.
Any other security related examples. (2)
TOTAL SECTION F:40
GRAND TOTAL:50